Configuring Ssh Connection; Figure 1-3 Telnet Connection Configuration Example - Zte ZXR10 ZSR V2 Configuration Manual (System Management

Intelligent integrated multi-service router
Hide thumbs Also See for ZXR10 ZSR V2:
Table of Contents

Advertisement

ZXR10 ZSR V2 Configuration Guide (System Management)
l
Configuration Description
It is required to connect a PC to R1 through Telnet, see

Figure 1-3 Telnet Connection Configuration Example

l
Configuration Flow
1. Connect a PC to R1.
2. Configure Telnet on R1.
3. Configure an ACL on R1 to filter TCP connections.
l
Configuration Commands
Run the following commands on R1:
R1(config)#line telnet idle-timeout 120
R1(config)#line telnet absolute-timeout 1440
R1(config)#line telnet access-class ipv4 wd
R1(config)#ipv4-access-list wd
R1(config-ipv4-acl)#rule permit tcp 169.1.108.82 0.0.0.0 any
R1(config-ipv4-acl)#exit
l
Configuration Verification
If no ACL is configured, a PC whose IP address is in any network segment can be
connected to R1.
If an ACL is configured, only PCs whose IP addresses are in the Permit column of
the ACL can be connected to R1.

1.4 Configuring SSH Connection

This procedure describes how to connect to the ZXR10 ZSR V2 through SSH.
Prerequisite
The local terminal can access the remote router network.
Context
Secure Shell (SSH) is defined by the
established on the basis of the application layer and transport layer.
Traditional network service programs such as FTP, POP, and Telnet use clear text to
transfer data. Therefore, user names and passwords are vulnerable to man-in-the-middle
attacks. Compared with traditional network service programs, SSH is more reliable. It
provides security for remote login sessions and other network services, and has the
following advantages:
SJ-20140504150128-007|2014-05-10 (R1.0)
IETF
Network Working Group. It is a security protocol
1-6
ZTE Proprietary and Confidential
Figure
1-3.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents